Editor’s note: This is the 74th article in the “Real Words or Buzzwords?” series about how real words become empty words and stifle technology progress. First physical security devices were labelled ...
Recent NIST guidance includes how to apply foundational NIST cybersecurity documents to a physical access control system (PACS). Q: Our CISO just informed me that NIST has classified physical access ...
When it comes to enterprise security, the physical world and the cyber domain have long been treated as separate — like a Venn diagram whose circles don't overlap. Those days are over. Companies are ...
Cargo theft has reached unprecedented levels in the U.S. transportation industry. This complex and evolving threat is one that the entire industry is working to address but one that still results in ...
Video surveillance, face recognition and artificial intelligence have become common in physical security. For colleges and universities, that raises some serious questions about privacy. Benefits to ...
When people think of technology and security, it’s likely cybersecurity that comes to mind. And leveraging tech tools to better detect and defend against cyber breaches is certainly a top priority for ...
Eric Marchewitz is a field solution architect with a 23-year career in cybersecurity solutions, working for such companies as PGP Security, McAfee, Cisco and Check Point. He is a recovering CISSP and ...
We hear a lot about the risks of social engineering, and there are a host of articles recommending how to defend against unauthorized access to facilities and their network infrastructures. However, ...
Protecting students, teachers and staff requires a 360-degree approach as part of a holistic physical security strategy. Not only do schools need physical security measures, such as door locks and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results